Ethical Issues in International Marketing is a valuable resource for readers’increasing need for knowledge of this important area. In recent years, ethical issues in international marketing have come to the forefront due to publicity and controversy generated from several international cases of questionable ethics. To date, little research has been conducted in the area of international marketing ethics. Delener's book comes at an important time to alert readers to the growing concern for greater ethical behavior in the international marketing arena. It provides illustrations to give readers hands-on experiences that can transfer directly into the marketing world. Delener and his contributing authors identify the unique importance of ethics and corporate social responsibility in global markets. Ethical Issues in International Marketing was conceived to allow researchers the liberty to explore the topic in the context of an environment supportive of the difficulties associated with this type of research. The contributing authors discuss these main topics: A social contract for analyzing and evaluating the activities of transnational corporations in developing countries The relationship of marketing ethics to gray markets for consumer goods How moral commitment is shaped by socialization and role of culture in Turkey The relationship between Egyptian consumers’ideology and theirperceptions of ethical behavior Readers who desire to make steps toward better global decisionmaking will find this a compelling book. The authors make readers realize that conducting business transactions efficiently and effectively in a mere technocratic sense is no longer sufficient. Ethical issues in the international marketing environment are best addressed in learning more about the differences between cultures, which this book begins to do.
Ethical issues in the international marketing environment are best addressed in learning more about the differences between cultures, which this book begins to do.
"Web applications have become increasingly popular due to their potential for businesses' high revenue gain through global reach. Along with these opportunities, also come challenges in terms of Web application security. The increased rise in the number of data-driven applications has also seen an increased rise in their systematic attacks. Cyber-attacks exploit Web application vulnerabilities. Attack trends show a major increase in Web application vulnerabilities caused by improper implementation of information-flow control methods and they account for more than 50% of all Web application vulnerabilities found in the year 2013. Static code analysis using methods of information-flow control is a widely acknowledged technique to secure Web applications. Whilst this technique has been found to be both very effective and efficient in finding Web application vulnerabilities, specific tools are highly dependent on the programming language. This thesis leverages Semantic Web technologies in order to offer a common language through source code represented using the Resource Description Framework format, whereby reasoning can be applied to securely test Web applications. In this thesis, we present a framework that extracts source code facts from various programming languages at a variable-level of granularity using Abstract Syntax Trees (ASTs) generated using language grammars and the ANTLR parser generator. The methodology for detecting Web application vulnerabilities implements three phases: entry points identification, tracing information-flow and vulnerability detection using the Jena framework inference mechanism and rules describing patterns of source code. The approach discussed in this thesis is found to be effective and practical in finding Web application vulnerabilities with the limitation that it can only detect patterns that are used as training data or very similar patterns. False positives are caused by limitations of the language grammar, but they do not affect the accuracy of the security vulnerability detection method in identifying the correct Web application vulnerability." -- Abstract.